"Android XLoader Malware Gains Auto-Execution Capability"

1 min read
Source: BleepingComputer
"Android XLoader Malware Gains Auto-Execution Capability"
Photo: BleepingComputer
TL;DR Summary

A new version of the XLoader Android malware, operated by the financially motivated threat actor 'Roaming Mantis,' can now automatically execute on infected devices without user interaction. It spreads through SMS texts containing URLs to deliver malicious APK installation files, and it disguises itself as legitimate software, notably the Chrome web browser. The malware requests risky permissions, such as accessing SMS content and running in the background, and can perform custom phishing attacks, extract sensitive information, and execute various commands received from its command and control server. McAfee advises using security products to detect and remove these threats.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

2 min

vs 3 min read

Condensed

84%

59498 words

Want the full story? Read the original article

Read on BleepingComputer